Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The states of data, Part 4: Securing data in motion through treacherous transits

In our previous blog, Data in use and why you need to keep an eye on file activities, we discussed why you should monitor how your data is being used, threats to data in use, and how you can protect it. But, when your data is on the move, you need other security capabilities to secure it. In this blog, we’ll explore data in motion. Gone are the days when you’d simply store your data in your local database and share it with peers when required.

How to Detect Threats to AI Systems with MITRE ATLAS Framework

Cyber threats against AI systems are on the rise, and today’s AI developers need a robust approach to securing AI applications that address the unique vulnerabilities and attack patterns associated with AI systems and ML models deployed in production environments. In this blog, we’re taking a closer look at two specific tools that AI developers can use to help detect cyber threats against AI systems.

Happy NIS2 Day...or is it? Navigating the shift from NIS to NIS2 and how to support long-term compliance

As digital transformation accelerates, so do the cybersecurity risks, particularly for organisations handling critical infrastructure and sensitive data. To address these challenges, the European Union has updated its cybersecurity regulations with NIS2 (Network and Information Security Directive 2), expanding and strengthening the original NIS Directive, which was established to improve cybersecurity across essential sectors.

Introducing: Extensive AppSec visibility with Snyk Analytics

Your developer team is growing rapidly, and modern applications are becoming increasingly complex. With the rise of GenAI, both developer productivity and security risks are on the rise; How can your application security stay ahead? Snyk Analytics is our most powerful solution yet for AppSec leaders seeking to gain the visibility and insights needed to proactively address security threats.

Bridging the IT Skills Gap with Essential Data Expertise and Growth Strategies

The fast evolution of technology in the IT industry has made it increasingly important for professionals to keep up with emerging trends and skill sets. Data security, analytics, and automation have become crucial as companies deal with growing cyberattacks and data breach threats. To remain relevant and secure, IT professionals must actively address skill gaps in these areas, while organizations should create environments that prioritize continuous learning.

Evolution of Scalper Bots Part 4: New Bot Tactics vs. Anti-Bot Tools and Legislation

Welcome back to our Evolution of Scalper Bots series. In our last post, we explored how scalper bots expanded into new markets from 2010 to 2014. We saw the scalper bot industry rise and a technological arms race begin between developers and retailers. As we delve into the period of 2015 to 2017, this battle intensifies. Scalper bots become more sophisticated, retailers implement new countermeasures, and legal challenges emerge.

AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security

AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that AI-enhanced cyber attacks are now the top concern of security leaders. I recently wrote about how prolific ransomware attacks are and what the outcomes were for those experiencing attacks. In the same report - GetApp’s 2024 Data Security report – I also found some interesting data around where AI sits in the list of concerns for cybersecurity leaders.

How to Improve Your Website Security: A Comprehensive Guide

A secure website is not just an option but a necessity. With businesses increasingly relying on online platforms, the potential risks associated with inadequate website security have never been more important. Cyber threats are rampant, targeting not only businesses but also their customers, making understanding and implementing robust security measures essential for anyone with an online presence.

Ensuring comprehensive security testing in DevOps pipelines

DevOps has dominated the 21st-century software industry as a powerful methodology for streamlining processes and improving collaboration between development and operations teams. However, as organizations shift towards this model, a critical aspect is often overlooked: security. This led to the advent of DevSecOps, an approach that aims to bridge the gap by integrating security practices into DevOps workflows.